Skip to content

Commit 60ce8fb

Browse files
Fix merge conflicts.
2 parents e5baa71 + 97f8003 commit 60ce8fb

File tree

797 files changed

+12804
-6177
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

797 files changed

+12804
-6177
lines changed

.openpublishing.redirection.json

Lines changed: 51 additions & 74 deletions
Original file line numberDiff line numberDiff line change
@@ -856,78 +856,6 @@
856856
"redirect_url": "/azure/cognitive-services/personalizer/how-to-manage-model",
857857
"redirect_document_id": false
858858
},
859-
{
860-
"source_path": "articles/cognitive-services/QnaMaker/quickstarts/create-new-kb-csharp.md",
861-
"redirect_url": "/azure/cognitive-services/QnaMaker/quickstarts/quickstart-rest-curl",
862-
"redirect_document_id": false
863-
},
864-
{
865-
"source_path": "articles/cognitive-services/QnaMaker/quickstarts/create-new-kb-go.md",
866-
"redirect_url": "/azure/cognitive-services/QnaMaker/quickstarts/quickstart-rest-curl",
867-
"redirect_document_id": false
868-
},
869-
{
870-
"source_path": "articles/cognitive-services/QnaMaker/quickstarts/create-new-kb-java.md",
871-
"redirect_url": "/azure/cognitive-services/QnaMaker/quickstarts/quickstart-rest-curl",
872-
"redirect_document_id": false
873-
},
874-
{
875-
"source_path": "articles/cognitive-services/QnaMaker/quickstarts/create-new-kb-python.md",
876-
"redirect_url": "/azure/cognitive-services/QnaMaker/quickstarts/quickstart-rest-curl",
877-
"redirect_document_id": false
878-
},
879-
{
880-
"source_path": "articles/cognitive-services/QnaMaker/quickstarts/get-answer-from-knowledge-base-csharp.md",
881-
"redirect_url": "/azure/cognitive-services/QnaMaker/quickstarts/quickstart-rest-curl",
882-
"redirect_document_id": false
883-
},
884-
{
885-
"source_path": "articles/cognitive-services/QnaMaker/quickstarts/get-answer-from-knowledge-base-go.md",
886-
"redirect_url": "/azure/cognitive-services/QnaMaker/quickstarts/quickstart-rest-curl",
887-
"redirect_document_id": false
888-
},
889-
{
890-
"source_path": "articles/cognitive-services/QnaMaker/quickstarts/get-answer-from-knowledge-base-java.md",
891-
"redirect_url": "/azure/cognitive-services/QnaMaker/quickstarts/quickstart-rest-curl",
892-
"redirect_document_id": false
893-
},
894-
{
895-
"source_path": "articles/cognitive-services/QnaMaker/quickstarts/get-answer-from-knowledge-base-python.md",
896-
"redirect_url": "/azure/cognitive-services/QnaMaker/quickstarts/quickstart-rest-curl",
897-
"redirect_document_id": false
898-
},
899-
{
900-
"source_path": "articles/cognitive-services/QnaMaker/quickstarts/get-answer-from-knowledge-base-nodejs.md",
901-
"redirect_url": "/azure/cognitive-services/QnaMaker/quickstarts/quickstart-rest-curl",
902-
"redirect_document_id": false
903-
},
904-
905-
{
906-
"source_path": "articles/cognitive-services/QnaMaker/quickstarts/publish-kb-csharp.md",
907-
"redirect_url": "/azure/cognitive-services/QnaMaker/quickstarts/quickstart-rest-curl",
908-
"redirect_document_id": false
909-
},
910-
{
911-
"source_path": "articles/cognitive-services/QnaMaker/quickstarts/publish-kb-go.md",
912-
"redirect_url": "/azure/cognitive-services/QnaMaker/quickstarts/quickstart-rest-curl",
913-
"redirect_document_id": false
914-
},
915-
{
916-
"source_path": "articles/cognitive-services/QnaMaker/quickstarts/publish-kb-java.md",
917-
"redirect_url": "/azure/cognitive-services/QnaMaker/quickstarts/quickstart-rest-curl",
918-
"redirect_document_id": false
919-
},
920-
{
921-
"source_path": "articles/cognitive-services/QnaMaker/quickstarts/publish-kb-python.md",
922-
"redirect_url": "/azure/cognitive-services/QnaMaker/quickstarts/quickstart-rest-curl",
923-
"redirect_document_id": false
924-
},
925-
{
926-
"source_path": "articles/cognitive-services/QnaMaker/quickstarts/publish-kb-nodejs.md",
927-
"redirect_url": "/azure/cognitive-services/QnaMaker/quickstarts/quickstart-rest-curl",
928-
"redirect_document_id": false
929-
},
930-
931859
{
932860
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-bot-csharp-appinsights.md",
933861
"redirect_url": "/azure/cognitive-services/LUIS/luis-csharp-tutorial-bf-v4",
@@ -1773,6 +1701,26 @@
17731701
"redirect_url": "/azure/cognitive-services/bing-web-search/quickstarts/client-libraries?pivots=programming-language-python",
17741702
"redirect_document_id": false
17751703
},
1704+
{
1705+
"source_path": "articles/cognitive-services/Bing-Image-Search/image-search-sdk-quickstart.md",
1706+
"redirect_url": "/azure/cognitive-services/bing-image-search/quickstarts/client-libraries?pivots=programming-language-csharp",
1707+
"redirect_document_id": false
1708+
},
1709+
{
1710+
"source_path": "articles/cognitive-services/Bing-Image-Search/image-sdk-java-quickstart.md",
1711+
"redirect_url": "/azure/cognitive-services/bing-image-search/quickstarts/client-libraries?pivots=programming-language-java",
1712+
"redirect_document_id": false
1713+
},
1714+
{
1715+
"source_path": "articles/cognitive-services/Bing-Image-Search/image-search-sdk-node-quickstart.md",
1716+
"redirect_url": "/azure/cognitive-services/bing-image-search/quickstarts/client-libraries?pivots=programming-language-javascript",
1717+
"redirect_document_id": false
1718+
},
1719+
{
1720+
"source_path": "articles/cognitive-services/Bing-Image-Search/image-sdk-python-quickstart.md",
1721+
"redirect_url": "/azure/cognitive-services/bing-image-search/quickstarts/client-libraries?pivots=programming-language-python",
1722+
"redirect_document_id": false
1723+
},
17761724
{
17771725
"source_path": "articles/virtual-machines/linux/classic/rdma-cluster.md",
17781726
"redirect_url": "/azure/virtual-machines/linux/sizes-hpc#rdma-capable-instances",
@@ -6778,6 +6726,10 @@
67786726
"redirect_url": "/azure/logic-apps/logic-apps-using-sap-connector",
67796727
"redirect_document_id": true
67806728
},
6729+
{
6730+
"source_path": "articles/scheduler/get-started-portal.md",
6731+
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
6732+
},
67816733
{
67826734
"source_path": "articles/connectors/connectors-create-api-googledrive.md",
67836735
"redirect_url": "https://docs.microsoft.com/connectors/googledrive/",
@@ -14988,6 +14940,11 @@
1498814940
"redirect_url": "/azure/machine-learning/how-to-designer-sample-text-classification",
1498914941
"redirect_document_id": true
1499014942
},
14943+
{
14944+
"source_path": "articles/machine-learning/designer-sample-datasets.md",
14945+
"redirect_url": "/azure/machine-learning/sample-designer-datasets",
14946+
"redirect_document_id": false
14947+
},
1499114948
{
1499214949
"source_path": "articles/machine-learning/service/how-to-enable-app-insights.md",
1499314950
"redirect_url": "/azure/machine-learning/how-to-enable-app-insights",
@@ -15293,6 +15250,16 @@
1529315250
"redirect_url": "/azure/machine-learning/tutorial-train-models-with-aml",
1529415251
"redirect_document_id": true
1529515252
},
15253+
{
15254+
"source_path": "articles/machine-learning/algorithm-module-reference/pca-based-anomaly-detection.md",
15255+
"redirect_url": "/azure/machine-learning/algorithm-module-reference/module-reference",
15256+
"redirect_document_id": false
15257+
},
15258+
{
15259+
"source_path": "articles/machine-learning/algorithm-module-reference/train-anomaly-detection-model.md",
15260+
"redirect_url": "/azure/machine-learning/algorithm-module-reference/module-reference",
15261+
"redirect_document_id": false
15262+
},
1529615263
{
1529715264
"source_path": "articles/machine-learning/how-to-ui-sample-regression-predict-automobile-price-basic.md",
1529815265
"redirect_url": "/azure/machine-learning/how-to-designer-sample-regression-automobile-price-basic",
@@ -18628,6 +18595,11 @@
1862818595
"redirect_url": "/azure/backup/backup-azure-backup-faq",
1862918596
"redirect_document_id": false
1863018597
},
18598+
{
18599+
"source_path": "articles/backup/backup-configure-vault.md",
18600+
"redirect_url": "/azure/backup/backup-windows-with-mars-agent",
18601+
"redirect_document_id": false
18602+
},
1863118603
{
1863218604
"source_path": "articles/backup/backup-upgrade-backup-vault.md",
1863318605
"redirect_url": "/azure/backup/backup-azure-backup-faq",
@@ -31120,7 +31092,7 @@
3112031092
},
3112131093
{
3112231094
"source_path": "articles/backup/backup-configure-vault-classic.md",
31123-
"redirect_url": "/azure/backup/backup-configure-vault",
31095+
"redirect_url": "/azure/backup/backup-windows-with-mars-agent",
3112431096
"redirect_document_id": false
3112531097
},
3112631098
{
@@ -31130,7 +31102,7 @@
3113031102
},
3113131103
{
3113231104
"source_path": "articles/backup/backup-try-azure-backup-in-10-mins.md",
31133-
"redirect_url": "/azure/backup/backup-configure-vault",
31105+
"redirect_url": "/azure/backup/backup-windows-with-mars-agent",
3113431106
"redirect_document_id": false
3113531107
},
3113631108
{
@@ -49223,6 +49195,11 @@
4922349195
"source_path": "articles/jenkins/install-jenkins-solution-template.md",
4922449196
"redirect_url": "/azure/jenkins/install-solution-template-tutorial",
4922549197
"redirect_document_id": true
49198+
},
49199+
{
49200+
"source_path": "articles/cognitive-services/Speech-Service/sapi-phoneset-usage.md",
49201+
"redirect_url": "/azure/cognitive-services/speech-service/speech-ssml-phonetic-sets",
49202+
"redirect_document_id": false
4922649203
}
4922749204
]
4922849205
}

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -329,6 +329,8 @@
329329
href: restful-technical-profile.md
330330
- name: SAML
331331
href: saml-technical-profile.md
332+
- name: SAML token issuer
333+
href: saml-issuer-technical-profile.md
332334
- name: Self-asserted
333335
href: self-asserted-technical-profile.md
334336
- name: SSO session

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/13/2020
12+
ms.date: 03/09/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -24,8 +24,8 @@ Azure Active Directory B2C (Azure AD B2C) provides support for the Azure Active
2424

2525
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly `Web.TPEngine.Providers.AzureActiveDirectoryProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null`.
2626

27-
All Azure AD technical profiles include the **AAD-Common** technical profile. The following technical profiles don't specify the protocol because the protocol is configured in the **AAD-Common** technical profile:
28-
27+
Following [custom policy starter pack](custom-policy-get-started.md#custom-policy-starter-pack) Azure AD technical profiles include the **AAD-Common** technical profile. The Azure AD technical profiles don't specify the protocol because the protocol is configured in the **AAD-Common** technical profile:
28+
2929
- **AAD-UserReadUsingAlternativeSecurityId** and **AAD-UserReadUsingAlternativeSecurityId-NoError** - Look up a social account in the directory.
3030
- **AAD-UserWriteUsingAlternativeSecurityId** - Create a new social account.
3131
- **AAD-UserReadUsingEmailAddress** - Look up a local account in the directory.
@@ -54,13 +54,13 @@ The following example shows the **AAD-Common** technical profile:
5454

5555
## Input claims
5656

57-
The following technical profiles include **InputClaims** for social and local accounts:
57+
The InputClaims element contains a claim, which is used to look up an account in the directory, or create a new one. There must be exactly one InputClaim element in the input claims collection for all Azure AD technical profiles. You may need to map the name of the claim defined in your policy to the name defined in Azure Active Directory.
58+
59+
To read, update, or delete an existing user account, the input claim is a key that uniquely identifies the account in Azure AD directory. For example, **objectId**, **userPrincipalName**, **signInNames.emailAddress**, **signInNames.userName**, or **alternativeSecurityId**.
5860

59-
- The social account technical profiles **AAD-UserReadUsingAlternativeSecurityId** and **AAD-UserWriteUsingAlternativeSecurityId** includes the **AlternativeSecurityId** claim. This claim contains the social account user identifier.
60-
- The local account technical profiles **AAD-UserReadUsingEmailAddress** and **AAD-UserWriteUsingLogonEmail** includes the **email** claim. This claim contains the sign-in name of the local account.
61-
- The unified (local and social) technical profiles **AAD-UserReadUsingObjectId**, **AAD-UserWritePasswordUsingObjectId**, **AAD-UserWriteProfileUsingObjectId**, and **AAD-UserWritePhoneNumberUsingObjectId** includes the **objectId** claim. The unique identifier of an account.
61+
To create a new user account, the input claim is a key that uniquely identifies a local or federated account. For example, local account: **signInNames.emailAddress**, or **signInNames.userName**. For a federated account: the **alternativeSecurityId**.
6262

63-
The **InputClaimsTransformations** element may contain a collection of **InputClaimsTransformation** elements that are used to modify the input claims or generate new ones.
63+
The InputClaimsTransformations element may contain a collection of input claims transformation elements that are used to modify the input claim or generate new one.
6464

6565
## Output claims
6666

articles/active-directory-b2c/claimsschema.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 02/24/2020
11+
ms.date: 03/05/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -52,9 +52,12 @@ The **ClaimType** element contains the following elements:
5252
| Mask | 0:1 | An optional string of masking characters that can be applied when displaying the claim. For example, the phone number 324-232-4343 can be masked as XXX-XXX-4343. |
5353
| UserHelpText | 0:1 | A description of the claim type that can be helpful for users to understand its purpose. The value can be [localized](localization.md). |
5454
| UserInputType | 0:1 | The type of input control that should be available to the user when manually entering the claim data for the claim type. See the user input types defined later in this page. |
55+
| AdminHelpText | 0:1 | A description of the claim type that can be helpful for administrators to understand its purpose. |
5556
| Restriction | 0:1 | The value restrictions for this claim, such as a regular expression (Regex) or a list of acceptable values. The value can be [localized](localization.md). |
5657
PredicateValidationReference| 0:1 | A reference to a **PredicateValidationsInput** element. The **PredicateValidationReference** elements enable you to perform a validation process to ensure that only properly formed data is entered. For more information, see [Predicates](predicates.md). |
5758

59+
60+
5861
### DataType
5962

6063
The **DataType** element supports the following values:

articles/active-directory-b2c/code-samples.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,5 +42,4 @@ The following tables provide links to samples for applications including iOS, An
4242

4343
| Sample | Description |
4444
|--------| ----------- |
45-
| [javascript-msal-singlepageapp](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp) | A single page application (SPA) calling a Web API. Authentication is done with Azure AD B2C by leveraging MSAL.js. |
46-
| [javascript-hellojs-singlepageapp](https://github.com/Azure-Samples/active-directory-b2c-javascript-hellojs-singlepageapp) | A single page app, implemented with an ASP.NET Web API backend, that signs up & signs in users using Azure AD B2C and calls the web API using OAuth 2.0 access tokens. |
45+
| [javascript-msal-singlepageapp](https://github.com/Azure-Samples/active-directory-b2c-javascript-msal-singlepageapp) | A single page application (SPA) calling a Web API. Authentication is done with Azure AD B2C by using MSAL.js. |

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ Next, upload the SAML assertion and response signing certificate to Azure AD B2C
109109
110110
### 2.1 Create the SAML token issuer
111111
112-
Now, add the capability for your tenant to issue SAML tokens.
112+
Now, add the capability for your tenant to issue SAML tokens, using [SAML token issuer](saml-issuer-technical-profile.md) and [SAML session provider](custom-policy-reference-sso.md#samlssosessionprovider) technical profiles.
113113
114114
Open `SocialAndLocalAccounts\`**`TrustFrameworkExtensions.xml`** in the custom policy starter pack.
115115
@@ -293,7 +293,7 @@ The metadata is information used in the SAML protocol to expose the configuratio
293293

294294
If there are properties specified in *both* the SAML metadata URL and in the application registration's manifest, they are **merged**. The properties specified in the metadata URL are processed first and take precedence.
295295

296-
For this tutorial which uses the SAML test application, use the following value for `samlMetadataUrl`:
296+
For this tutorial, which uses the SAML test application, use the following value for `samlMetadataUrl`:
297297

298298
```JSON
299299
"samlMetadataUrl":"https://samltestapp2.azurewebsites.net/Metadata",
@@ -320,7 +320,7 @@ For this tutorial, in which you use the SAML test application, set the `url` pro
320320

321321
This optional property represents the `Logout` URL (`SingleLogoutService` URL in the relying party metadata), and the `BindingType` for this is assumed to be `Http-Redirect`.
322322

323-
For this tutorial which uses the SAML test application, leave `logoutUrl` set to `https://samltestapp2.azurewebsites.net/logout`:
323+
For this tutorial, which uses the SAML test application, leave `logoutUrl` set to `https://samltestapp2.azurewebsites.net/logout`:
324324

325325
```JSON
326326
"logoutUrl": "https://samltestapp2.azurewebsites.net/logout",

articles/active-directory-b2c/custom-email.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/05/2020
12+
ms.date: 03/05/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -295,10 +295,6 @@ Add the following technical profiles to the `<ClaimsProviders>` element.
295295
<Protocol Name="Proprietary" Handler="Web.TPEngine.Providers.OneTimePasswordProtocolProvider, Web.TPEngine, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
296296
<Metadata>
297297
<Item Key="Operation">VerifyCode</Item>
298-
<Item Key="UserMessage.VerificationHasExpired">You have exceed the maximum time allowed.</Item>
299-
<Item Key="UserMessage.MaxRetryAttemped">You have exceed the number of retries allowed.</Item>
300-
<Item Key="UserMessage.InvalidCode">You have entered the wrong code.</Item>
301-
<Item Key="UserMessage.ServerError">Cannot verify the code, please try again later.</Item>
302298
</Metadata>
303299
<InputClaims>
304300
<InputClaim ClaimTypeReferenceId="email" PartnerClaimType="identifier" />
@@ -359,6 +355,12 @@ For more information, see [Self-asserted technical profile](restful-technical-pr
359355
<Item Key="IpAddressClaimReferenceId">IpAddress</Item>
360356
<Item Key="ContentDefinitionReferenceId">api.localaccountsignup</Item>
361357
<Item Key="language.button_continue">Create</Item>
358+
359+
<!--OTP validation error messages-->
360+
<Item Key="UserMessageIfSessionDoesNotExist">You have exceed the maximum time allowed.</Item>
361+
<Item Key="UserMessageIfMaxRetryAttempted">You have exceed the number of retries allowed.</Item>
362+
<Item Key="UserMessageIfInvalidCode">You have entered the wrong code.</Item>
363+
<Item Key="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</Item>
362364
</Metadata>
363365
<InputClaims>
364366
<InputClaim ClaimTypeReferenceId="email" />

0 commit comments

Comments
 (0)